Long PN Code Based Traceback in Wireless Networks
نویسندگان
چکیده
Cyber criminals may abuse open wireless networks or those with weak encryption for cyber crimes. Assume surveillance has identified suspect traffic such as child porn downloading traffic on the Internet. To locate such criminals, law enforcement has to first identify which mobile (MAC) is generating suspect traffic behind a wireless router. The challenge is how to correlate the private wireless traffic and the identified suspect public traffic on the Internet. Traffic correlation in unencrypted wireless networks is straightforward by packet ID and other traffic features. Traceback in encrypted wireless networks is complicated since encryption hides recognizable IP packet content. In this paper, we propose a new technique called long Pseudo-Noise (PN) code based Direct Sequence Spread Spectrum (DSSS) flow marking technique for invisibly tracing suspect anonymous wireless flows. In this technique, a long PN code is shared by two investigators, interferer and sniffer. The long PN code is used to spread a signal. One segment of the long PN code is used to spread one bit of the signal. Different bits of the signal will be encoded with different segments of the long PN code. By interfering with a sender's traffic and marginally varying its rate, interferer can embed a secret spread spectrum signal into the sender's traffic. By tracing where the embedded signal goes, sniffer can trace the sender and receiver of the suspect flow despite the use of anonymous encrypted wireless networks. Traffic embedded with long PN code modulated watermarks is much harder to detect. We have conducted extensive analysis and experiments to show the effectiveness of this new technique. We are able to prove that existing detection approaches cannot detect the long PN code modulated traffic. The technique is generic and has broad usage.
منابع مشابه
Improving Long PN-Code Acquisition in the Presence of Doppler Frequency Shifts
Wireless communication is the major form of connection nowadays. In most cases it exploits the benefits of the spread spectrum techniques to overcome channel introduced corruptions like Doppler residual frequency, noise, interference and jamming. These techniques also enhance the security and quality of the link. Using long spreading pseudo-noise codes provides further security for the link tho...
متن کاملTracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target’s computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attack packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attac...
متن کاملA Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs
Security is a pivotal issue for wireless sensor networks (WSNs), which are emerging as a promising platform that enables a wide range of military, scientific, industrial and commercial applications. Traceback, a key cyber-forensics technology, can play an important role in tracing and locating a malicious source to guarantee cybersecurity. In this work a trust-based adaptive probability marking...
متن کاملPN code acquisition for DS-CDMA systems employing smart antennas .II
Recently, a smart antenna, i.e., a blind adaptive antenna array, has attracted much attention to improve the capacity of a future code-division multiple-access wireless communications system. It has been demonstrated (Tanaka et al., 2000) that there is significant improvement in data demodulation through lab simulations and field experiments by employing a smart antenna of multiple elements. Ho...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کامل